Anabel Ton
Examiner (ID: 8080, Phone: (571)272-2382 , Office: P/2875 )
Most Active Art Unit | 2875 |
Art Unit(s) | 2875 |
Total Applications | 2154 |
Issued Applications | 1750 |
Pending Applications | 76 |
Abandoned Applications | 327 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 16488942
[patent_doc_number] => 20200382557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => Reliability Prediction for Cloud Security Policies
[patent_app_type] => utility
[patent_app_number] => 16/428858
[patent_app_country] => US
[patent_app_date] => 2019-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8685
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16428858
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/428858 | Reliability prediction for cloud security policies | May 30, 2019 | Issued |
Array
(
[id] => 17731772
[patent_doc_number] => 11388183
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-12
[patent_title] => Systems and methods for tracking risk on data maintained in computer networked environments
[patent_app_type] => utility
[patent_app_number] => 16/424194
[patent_app_country] => US
[patent_app_date] => 2019-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 23
[patent_no_of_words] => 20973
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16424194
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/424194 | Systems and methods for tracking risk on data maintained in computer networked environments | May 27, 2019 | Issued |
Array
(
[id] => 14841079
[patent_doc_number] => 20190278940
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => DATA PROTECTION BASED ON USER INPUT DURING DEVICE BOOT-UP, USER LOGIN, AND DEVICE SHUT-DOWN STATES
[patent_app_type] => utility
[patent_app_number] => 16/423746
[patent_app_country] => US
[patent_app_date] => 2019-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16423746
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/423746 | Data protection based on user input during device boot-up, user login, and device shut-down states | May 27, 2019 | Issued |
Array
(
[id] => 15367907
[patent_doc_number] => 20200019718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-16
[patent_title] => Method for managing the access authority to cloud storage and the system therefor
[patent_app_type] => utility
[patent_app_number] => 16/423170
[patent_app_country] => US
[patent_app_date] => 2019-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23577
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -42
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16423170
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/423170 | Method for managing the access authority to cloud storage and the system therefor | May 27, 2019 | Issued |
Array
(
[id] => 16117111
[patent_doc_number] => 20200210578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => SYSTEM AND METHOD OF DETECTING A SOURCE OF MALICIOUS ACTIVITY IN A COMPUTER SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/420409
[patent_app_country] => US
[patent_app_date] => 2019-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9717
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16420409
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/420409 | System and method of detecting a source of malicious activity in a computer system | May 22, 2019 | Issued |
Array
(
[id] => 16117107
[patent_doc_number] => 20200210576
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => METHOD AND SYSTEM FOR DETECTING MALICIOUS FILES USING BEHAVIOR PATTERNS
[patent_app_type] => utility
[patent_app_number] => 16/414832
[patent_app_country] => US
[patent_app_date] => 2019-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20492
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16414832
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/414832 | Method and system for detecting malicious files using behavior patterns | May 16, 2019 | Issued |
Array
(
[id] => 15047817
[patent_doc_number] => 20190334913
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-31
[patent_title] => METHOD AND APPARATUS FOR NATIVE AUTHENTICATION TO CLOUD SERVICES WITH IDENTITY MANAGEMENT OF ON-PREMISE APPLICATIONS FROM THE CLOUD
[patent_app_type] => utility
[patent_app_number] => 16/397866
[patent_app_country] => US
[patent_app_date] => 2019-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4305
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16397866
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/397866 | Method and apparatus for native authentication to cloud services with identity management of on-premise applications from the cloud | Apr 28, 2019 | Issued |
Array
(
[id] => 16186289
[patent_doc_number] => 10719622
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-21
[patent_title] => Cyber security system and method for transferring data between servers without a continuous connection
[patent_app_type] => utility
[patent_app_number] => 16/391623
[patent_app_country] => US
[patent_app_date] => 2019-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4011
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16391623
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/391623 | Cyber security system and method for transferring data between servers without a continuous connection | Apr 22, 2019 | Issued |
Array
(
[id] => 17892421
[patent_doc_number] => 11455392
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-27
[patent_title] => Methods and apparatus of anomalous memory access pattern detection for translational lookaside buffers
[patent_app_type] => utility
[patent_app_number] => 16/370849
[patent_app_country] => US
[patent_app_date] => 2019-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7189
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16370849
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/370849 | Methods and apparatus of anomalous memory access pattern detection for translational lookaside buffers | Mar 28, 2019 | Issued |
Array
(
[id] => 17211587
[patent_doc_number] => 11171978
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-09
[patent_title] => Dynamic monitoring, detection of emerging computer events
[patent_app_type] => utility
[patent_app_number] => 16/367152
[patent_app_country] => US
[patent_app_date] => 2019-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 22935
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16367152
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/367152 | Dynamic monitoring, detection of emerging computer events | Mar 26, 2019 | Issued |
Array
(
[id] => 18892027
[patent_doc_number] => 11870811
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-09
[patent_title] => Trusted execution security policy platform
[patent_app_type] => utility
[patent_app_number] => 16/981219
[patent_app_country] => US
[patent_app_date] => 2019-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 51
[patent_figures_cnt] => 28
[patent_no_of_words] => 16550
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16981219
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/981219 | Trusted execution security policy platform | Mar 25, 2019 | Issued |
Array
(
[id] => 15261933
[patent_doc_number] => 20190379700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => SYSTEMS AND METHODS FOR ALERT PRIORITIZATION USING SECURITY EVENTS GRAPH
[patent_app_type] => utility
[patent_app_number] => 16/361023
[patent_app_country] => US
[patent_app_date] => 2019-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9991
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16361023
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/361023 | Systems and methods for alert prioritization using security events graph | Mar 20, 2019 | Issued |
Array
(
[id] => 17877594
[patent_doc_number] => 11449610
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-20
[patent_title] => Threat detection system
[patent_app_type] => utility
[patent_app_number] => 16/356431
[patent_app_country] => US
[patent_app_date] => 2019-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3071
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16356431
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/356431 | Threat detection system | Mar 17, 2019 | Issued |
Array
(
[id] => 17957209
[patent_doc_number] => 11483331
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-25
[patent_title] => Consequence-driven cyber-informed engineering and related systems and methods
[patent_app_type] => utility
[patent_app_number] => 16/290511
[patent_app_country] => US
[patent_app_date] => 2019-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 4775
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16290511
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/290511 | Consequence-driven cyber-informed engineering and related systems and methods | Feb 28, 2019 | Issued |
Array
(
[id] => 17788801
[patent_doc_number] => 11411947
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Systems and methods for smart contract-based detection of authentication attacks
[patent_app_type] => utility
[patent_app_number] => 16/280126
[patent_app_country] => US
[patent_app_date] => 2019-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4830
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16280126
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/280126 | Systems and methods for smart contract-based detection of authentication attacks | Feb 19, 2019 | Issued |
Array
(
[id] => 14967283
[patent_doc_number] => 20190311120
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => DEVICE BEHAVIOR ANOMALY DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/265526
[patent_app_country] => US
[patent_app_date] => 2019-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10129
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16265526
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/265526 | Device behavior anomaly detection | Jan 31, 2019 | Issued |
Array
(
[id] => 16804346
[patent_doc_number] => 10999311
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-04
[patent_title] => Risk score generation for assets of an enterprise system utilizing user authentication activity
[patent_app_type] => utility
[patent_app_number] => 16/263246
[patent_app_country] => US
[patent_app_date] => 2019-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10191
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16263246
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/263246 | Risk score generation for assets of an enterprise system utilizing user authentication activity | Jan 30, 2019 | Issued |
Array
(
[id] => 16227283
[patent_doc_number] => 20200252400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-06
[patent_title] => METHODS, SYSTEMS, AND APPARATUSES FOR IMPROVED MULTI-FACTOR AUTHENTICATION IN A MULTI-APP COMMUNICATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/263889
[patent_app_country] => US
[patent_app_date] => 2019-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 30073
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16263889
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/263889 | Methods, systems, and apparatuses for improved multi-factor authentication in a multi-app communication system | Jan 30, 2019 | Issued |
Array
(
[id] => 14678957
[patent_doc_number] => 20190238593
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => AUTOMATIC DECOY DERIVATION THROUGH PATCH TRANSFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/264038
[patent_app_country] => US
[patent_app_date] => 2019-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5129
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16264038
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/264038 | Automatic decoy derivation through patch transformation | Jan 30, 2019 | Issued |
Array
(
[id] => 16193111
[patent_doc_number] => 20200233960
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-23
[patent_title] => Automatic Malware Signature Generation for Threat Detection Systems
[patent_app_type] => utility
[patent_app_number] => 16/253237
[patent_app_country] => US
[patent_app_date] => 2019-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4263
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 331
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16253237
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/253237 | Automatic malware signature generation for threat detection systems | Jan 21, 2019 | Issued |